nitrobuyer.exe?ex=670c445a&is=670af2da&hm=1f281fd80c98af4f9fd87d76a7cd35a3e597b77693d1a804430d0000615d585a&
First submission 2024-10-13 19:38:03
File details
File type: | PE32+ executable (GUI) x86-64, for MS Windows |
Mime type: | application/x-dosexec |
File size: | 18546.58 KB (18991698 bytes) |
Compile time: | 2024-10-13 00:05:56 |
MD5: | 32554d2f5dcd9927b21b43dda85359c2 |
SHA1: | cfc29320a821c84661de03ef07f96d6e0f9a707a |
SHA256: | e68f4ed80cc5d1c699653e106b4f36693dc45c0e571b9a71a1f010b1516a2271 |
Import Hash : | 72c4e339b7af8ab1ed2eb3821c98713a |
Sections 6 | .text .rdata .data .pdata .rsrc .reloc |
Directories 4 | import resource debug relocation |
File features detected
Anti VM
Signed
XOR
OSINT Enrichments
Virus Total: | 26/77 VT report date: 2024-10-13 00:08:48 |
Malware Type 1 | trojan |
Threat Type 3 | python discord luna |
URLs, FQDN and IP indicators 1
PE Sections 0 suspicious
Name | VAddress | VSize | Size | SHA1 | MD5 | Suspicious |
---|---|---|---|---|---|---|
.text | 0x1000 | 0x29f00 | 172032 | 2d9a342b9cea10af36a9defffc2a2fd763e338be | a6c3b829cc8eaabb1a474c227e90407f | |
.rdata | 0x2b000 | 0x12a50 | 76800 | 4a585a108b43f24d930847d9cbcb542ad3ed1bdb | ab6b5f10fdacea1311f022481f2c56da | |
.data | 0x3e000 | 0x53f8 | 3584 | 069fd3959f91e690643115a296bf21044144de01 | dba0caeecab624a0ccc0d577241601d1 | |
.pdata | 0x44000 | 0x2250 | 9216 | 09c2a6d5404bc19e11f7eddad07a164b42b01ee6 | 181312260a85d10a1454ba38901c499b | |
.rsrc | 0x47000 | 0x568 | 1536 | fe3f3cb7b5c6ea56860f944b35ad015d1f81a4c9 | 1f909f1505d4aac403fc692b4e3c4933 | |
.reloc | 0x48000 | 0x764 | 2048 | d73caf6099972c4407ac22954a7454e922084dc0 | 816c68eeb419ee2c08656c31c06a0fff |
PE Resources 1
Name | Language | Sublanguage | Offset | Size | Data |
---|---|---|---|---|---|
RT_MANIFEST | LANG_NEUTRAL | SUBLANG_NEUTRAL | 0x47058 | 1293 |
Packers detected 2
Microsoft Visual C++ 8.0 (DLL) |
Microsoft Visual C++ 8.0 |
Anti debug functions 6
GetLastError |
IsDebuggerPresent |
IsProcessorFeaturePresent |
RaiseException |
TerminateProcess |
UnhandledExceptionFilter |
Strings analysis - File found
Backup |
h.oLd |
Compressed |
base_library.zip |
bbase_library.zip |
Text |
bsetuptools\_vendor\jaraco.context-5.3.0.dist-info\top_level.txt |
bsetuptools\_vendor\importlib_resources-6.4.0.dist-info\top_level.txt |
bsetuptools\_vendor\jaraco.text-3.12.1.dist-info\top_level.txt |
bsetuptools\_vendor\jaraco.functools-4.0.1.dist-info\top_level.txt |
bsetuptools\_vendor\autocommand-2.2.2.dist-info\top_level.txt |
bsetuptools\_vendor\jaraco\text\Lorem ipsum.txt |
btypeguard-4.3.0.dist-info\top_level.txt |
bsetuptools\_vendor\zipp-3.19.2.dist-info\top_level.txt |
bsetuptools\_vendor\inflect-7.3.1.dist-info\top_level.txt |
bsetuptools\_vendor\importlib_metadata-8.0.0.dist-info\top_level.txt |
bsetuptools\_vendor\jaraco.collections-5.1.0.dist-info\top_level.txt |
bsetuptools\_vendor\wheel-0.43.0.dist-info\entry_points.txt |
bsetuptools\_vendor\typeguard-4.3.0.dist-info\top_level.txt |
bsetuptools\_vendor\backports.tarfile-1.2.0.dist-info\top_level.txt |
bwheel-0.43.0.dist-info\entry_points.txt |
bsetuptools\_vendor\typeguard-4.3.0.dist-info\entry_points.txt |
btypeguard-4.3.0.dist-info\entry_points.txt |
bwheel-0.43.0.dist-info\LICENSE.txt |
bsetuptools\_vendor\wheel-0.43.0.dist-info\LICENSE.txt |
Library |
mscoree.dll |
vcruntime140.dll |
bsqlite3.dll |
8python312.dll |
bpython312.dll |
bpywin32_system32\pywintypes312.dll |
bVCRUNTIME140_1.dll |
GDI32.dll |
ADVAPI32.dll |
KERNEL32.dll |
COMCTL32.dll |
ucrtbase.dll |
bVCRUNTIME140.dll |
USER32.dll |
blibcrypto-3.dll |
bpython3.dll |
blibffi-8.dll |
blibssl-3.dll |
Strings analysis - Possible IPs found 1
3.4.2.6 |
Strings analysis - Possible URLs found 1
http://schemas.microsoft.com/SMI/2016/WindowsSettings |
Import functions
Name | Latest seen | MD5 |
---|---|---|
discordnitrogen.exe | 2024-08-26 11:31:14 | 2db515aa4c8ba2b4e6878e7e0b550c8f |
tac.exe | 2024-09-23 16:57:06 | 8a35be4e0576e642603dc78f07f32a93 |
Software.exe | 2024-09-24 15:24:04 | 66c1d33fa2373f9f734336b87f123e31 |
st3amBYluxy.exe?ex=670cd923&is=670b87a3&hm=9d7dba21c2a8ad22d47f3edba77c4617ddfb3d025ff473df74bdf2b60f0c68d1& | 2024-10-13 17:33:03 | 23f733d217275847ffb11bf97827dae8 |
freenitro.exe?ex=670c1355&is=670ac1d5&hm=fe431b2f20f8cc958563e6e904e1c828290ba1470a54a6f82725608fa4784485& | 2024-10-13 19:34:02 | 8c9efd9a2d9d55aad11203cc4e3c816d |
mullakka.exe?ex=670c4027&is=670aeea7&hm=c37458cb8f8dc2985499fcc5dd86600a1dda5f7a724709109a97ae24970f4d65& | 2024-10-13 20:17:02 | 136c7ac634c84ad86c1c7340c9262116 |
FreakyBrowse.exe?ex=670c18f3&is=670ac773&hm=3a26c3c7751649dfe642708c7308021483cb3a3e840a9d7ffd5fdf0ed02746be& | 2024-10-13 20:39:02 | a2728dfccca75072dd2f6c6a02617ee6 |
distribution.exe | 2024-10-14 12:45:31 | 2cf67f645897af37ea483ed1aa3b2790 |
Wahiy_swapper.exe?ex=670e299f&is=670cd81f&hm=d668cc4432184523e29c1a622634c90477a431b1b18691a624773cd7989420a9& | 2024-10-14 16:52:04 | 8e77547b14323977331594025634d90a |
worker.exe | 2024-10-14 23:10:06 | 5f08961671234960517cefb9df7a8c41 |
Rv2_Nuker.exe?ex=670f7931&is=670e27b1&hm=22265025fa8bb5baf986ff9795b8348e2c4fa24d4f6cced287e52fcfb45bf1e7& | 2024-10-15 20:10:02 | b459e3a71f72a9ac8a725144d56d1168 |
hydra.exe?ex=670ef165&is=670d9fe5&hm=d1114b65b18c8fc6ac378cf57169ad9d4f23499ced8ea6fe3b1fe96461e38a98& | 2024-10-15 20:12:05 | d446fa000d260aa78513d383874d82e5 |
Exela.exe | 2024-10-15 21:10:21 | 83154f0731104f82b198eb13465dfa57 |